Lucene search

K
osvGoogleOSV:DSA-333
HistoryJun 27, 2003 - 12:00 a.m.

acm - integer overflow

2003-06-2700:00:00
Google
osv.dev
4

0.85 High

EPSS

Percentile

98.5%

acm, a multi-player aerial combat simulation, uses a network protocol
based on the same RPC implementation used in many C libraries. This
implementation was found to contain an integer overflow vulnerability
which could be exploited to execute arbitrary code.

For the stable distribution (woody) this problem has been fixed in
version 5.0-3.woody.1.

For the unstable distribution (sid) this problem has been fixed in
version 5.0-10.

We recommend that you update your acm package.